Remote Computer


A remote computer is a computer to which a user does not have physical access, but which he or she can access or manipulate via some kind of network.

Remote desktop software allows a person to control a computer from another computer; this allows the user to change anything on the linear computer, and access all of the file contents.

Remote desktop is a software application that turns one computer into the boss of another or a series of others. Remote desktop is sometimes found as part of a suite of other administrative applications; other times, remote desktop is its own entity, doing nothing but what it is supposed to do. Remote desktop software is available for all computer platforms.

Remote desktop requires that the “master” and “slave” computers be connected to the same network. This remote desktop network can be wired or wireless. Wired networks can use direct connections or connections through routers. Wireless networks can be formed using routers or the Internet.

Advanced security protocols are standard practice inclusions in remote desktop software, especially when the network is a wireless and/or Internet one. The latest versions of remote desktop software have 128-bit encryption protocols. Older versions might have protection of a lesser nature. If you are running remote desktop software, even if your connection is direct wired, you need to run advanced security protocols as well. Not to do so is to invite piracy.

Once the administrator has entered the correct password, the remote desktop software enables that administrator to access the target computer. Then, uploads, downloads, file transfers, and software maintenance can take place. Indeed, software maintenance is one of the most common uses of remote desktop software. Often, the administrator will shut down a malfunctioning software application or install a software upgrade using remote desktop software. This saves the time that it would take the administrator to physically insert a CD into the target computer or to do a manual software upgrade download.

The target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main clipboard, can be shared between target computer and administrator, however. Certain safety features can be built into the remote desktop software protocols such that the administrator is not able to delete or otherwise alter files without the target user’s permission. One other rather revolutionary thing that remote desktop software can do is to allow the administrator to run an audio or video application on a remote computer and have the sights and/or sounds redirected to the administrator’s computer.

There are many tools to remotely access the computers, such as VNC, RemotePC, LogMeIn, TeamViewer etc.

Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days where security was just a matter of the highest degree of encryption. Today, a truly secure remote support solution will allow organizations to centrally control who can do what and where safe in the knowledge that when each remote session has finished it should be able to document what actually took place.

For systems in environments that need to meet and maintain compliance requirements, remote administration software must have strict security control.

It is necessary to examine the remote control software functionality that best serves organizations that need a highly secure tool that crosses all platforms and devices and is completely scalable in any environment. It will help IT professionals select a remote control solution that increases productivity and customer satisfaction, as well as enhances the flexibility of the IT organization and improves the company’s risk profile.

Famous quotes containing the words remote and/or computer:

    To the young mind, every thing is individual, stands by itself. By and by, it finds how to join two things, and see in them one nature; then three, then three thousand; and so, tyrannized over by its own unifying instinct, it goes on tying things together, diminishing anomalies, discovering roots running underground, whereby contrary and remote things cohere, and flower out from one stem.
    Ralph Waldo Emerson (1803–1882)

    The analogy between the mind and a computer fails for many reasons. The brain is constructed by principles that assure diversity and degeneracy. Unlike a computer, it has no replicative memory. It is historical and value driven. It forms categories by internal criteria and by constraints acting at many scales, not by means of a syntactically constructed program. The world with which the brain interacts is not unequivocally made up of classical categories.
    Gerald M. Edelman (b. 1928)